A novel formal logic for formal analysis of timeliness in non-repudiation protocols

被引:2
|
作者
Yang, Ke [1 ]
Xiao, Meihua [1 ]
Zhong, Xiaomei [1 ]
Zhong, Yingqiang [1 ]
机构
[1] East China Jiaotong Univ, Sch Software, Nanchang 330013, Peoples R China
关键词
Non -repudiation protocols; Timeliness; Formal analysis; Logic reasoning; SECURITY; VERIFICATION;
D O I
10.1016/j.jksuci.2023.101664
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Non-repudiation protocols are aimed at exchanging digital messages and irrefutable receipts between two mistrusting parties over the Internet, which form the cornerstones of modern secure network transactions. Timeliness is a key security property of non-repudiation protocols, which ensures that protocol agents can terminate their execution within a finite time, and guarantees the satisfaction of timeconstraint among protocol events. A number of analysis methods have been proposed, but most of them cannot explicitly express the time factor which plays an important role in protocols. In order to address the challenge of analyzing timeliness, this paper extends the logic of events theory (LoET) and proposes a novel formal logic. By explicitly introducing the time factor into predicate formulas, the new logic can model actions, knowledge, and process states of each agent at different time points, thus enhancing its ability of time description. The formal semantics of new logic is given to avoid ambiguity of logic language and guarantee the soundness of new logic. A typical non-repudiation protocol is analyzed with new logic, and the timeliness flaw is discovered. The proposed logic overcomes the limitations of LoET in terms of time description and effectively addresses the issue of the inability to analyze timeliness. (c) 2023 The Author(s). Published by Elsevier B.V. on behalf of King Saud University. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).
引用
收藏
页数:17
相关论文
共 50 条
  • [31] BPEL processes for non-repudiation protocols in Web Services
    Bilal, M
    Thomas, JP
    Harrington, P
    Abraham, A
    International Conference on Next Generation Web Services Practices, 2005, : 299 - 304
  • [32] Fair multi-party non-repudiation protocols
    Steve Kremer
    Olivier Markowitch
    International Journal of Information Security, 2003, 1 (4) : 223 - 235
  • [33] Automatic Analysis of a Non-Repudiation Protocol
    Lanotte, Ruggero
    Maggiolo-Schettini, Andrea
    Troina, Angelo
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2005, 112 : 113 - 129
  • [34] On-the-fly model checking of fair non-repudiation Protocols
    Li, Guoqiang
    Ogawa, Mizuhito
    AUTOMATED TECHNOLOGY FOR VERIFICATION AND ANALYSIS, PROCEEDINGS, 2007, 4762 : 511 - +
  • [35] Timeout estimation using a simulation model for non-repudiation Protocols
    Carbonell, M
    Onieva, JA
    Lopez, J
    Galpert, D
    Zhou, JY
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2004, PT 1, 2004, 3043 : 903 - 914
  • [36] Fair BPEL processes transaction using non-repudiation protocols
    Bilal, M
    Thomas, JP
    2005 IEEE INTERNATIONAL CONFERENCE ON SERVICES COMPUTING, VOL 1, PROCEEDINGS, 2005, : 337 - 340
  • [37] Optimistic non-repudiation protocol analysis
    Santiago, Judson
    Vigneron, Laurent
    INFORMATION SECURITY THEORY AND PRACTICES: SMART CARDS, MOBILE AND UBIQUITOUS COMPUTING SYSTEMS, PROCEEDINGS, 2007, 4462 : 90 - +
  • [38] Logic-based formal analysis of cryptographic protocols
    Muhammad, Shahabuddin
    Furqan, Zeeshan
    Guha, Ratan K.
    ICON: 2006 IEEE INTERNATIONAL CONFERENCE ON NETWORKS, VOLS 1 AND 2, PROCEEDINGS: NETWORKING -CHALLENGES AND FRONTIERS, 2006, : 300 - +
  • [39] RFID-Based Non-repudiation Protocols for Supply Chains
    Piramuthu, Selwyn
    FUTURE NETWORK SYSTEMS AND SECURITY, FNSS 2017, 2017, 759 : 56 - 69
  • [40] Automatic Methods for Analyzing Non-repudiation Protocols with an Active Intruder
    Klay, Francis
    Vigneron, Laurent
    FORMAL ASPECTS IN SECURITY AND TRUST, 2009, 5491 : 192 - +